IET Biometrics最新文献

筛选
英文 中文
Biometrics and the metaphysics of personal identity 生物计量学与个人身份的形而上学
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-12-07 DOI: 10.1049/bme2.12062
Amy Kind
{"title":"Biometrics and the metaphysics of personal identity","authors":"Amy Kind","doi":"10.1049/bme2.12062","DOIUrl":"https://doi.org/10.1049/bme2.12062","url":null,"abstract":"<p>The vast advances in biometrics over the past several decades have brought with them a host of pressing concerns. Philosophical scrutiny has already been devoted to many of the relevant ethical and political issues, especially ones arising from matters of privacy, bias, and security in data collection. But philosophers have devoted surprisingly little attention to the relevant metaphysical issues, in particular, ones concerning matters of personal identity. This paper aims to take some initial steps to correct this oversight. After discussing the philosophical problem of personal identity, the ways in which the notion of biometric identity connects with, or fails to connect with, the philosophical notion of personal identity is explored. Though there may be some good reasons to use biometric identity to track personal identity, it is contended that biometric identity is not the same thing as personal identity and thus that biometrics researchers should stop talking as if it were.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 3","pages":"176-182"},"PeriodicalIF":2.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12062","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50123578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gradient boosting regression for faster Partitioned Iterated Function Systems-based head pose estimation 基于分段迭代函数系统的快速头部姿态估计的梯度增强回归
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-12-02 DOI: 10.1049/bme2.12061
Paola Barra, Riccardo Distasi, Chiara Pero, Stefano Ricciardi, Maurizio Tucci
{"title":"Gradient boosting regression for faster Partitioned Iterated Function Systems-based head pose estimation","authors":"Paola Barra,&nbsp;Riccardo Distasi,&nbsp;Chiara Pero,&nbsp;Stefano Ricciardi,&nbsp;Maurizio Tucci","doi":"10.1049/bme2.12061","DOIUrl":"10.1049/bme2.12061","url":null,"abstract":"<p>Head pose estimation (HPE) notoriously represents a crucial task for many computer vision applications in robotics, biometry and video surveillance. While, in general, HPE can be performed on both still images and frames extracted from live video or captured footage, its functional approach and the related processing pipeline may have a significant impact on suitability to different application contexts. This implies that, for any real-time application in which HPE is required, this information, namely the angular value of yaw, pitch and roll axes, should be provided in real-time as well. Since, so far, the primary aim in HPE research has been on improving estimation accuracy, there are only a few works reporting the computing time of the proposed HPE method and even less explicitly addressing it. The present work stems from a previous Partitioned Iterated Function Systems-based approach providing state-of-the-art accuracy with high computing cost, and improve it by means of two regression models, namely Gradient Boosting Regressor and Extreme Gradient Boosting Regressor, achieving much faster response and an even lower mean absolute error on the yaw and roll axis, as shown by experiments conducted on the BIWI and AFLW2000 datasets.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 4","pages":"279-288"},"PeriodicalIF":2.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81149191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition HandSegNet:使用卷积神经网络进行非接触式掌纹识别的手部分割
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-11-20 DOI: 10.1049/bme2.12058
Koichi Ito, Yusei Suzuki, Hiroya Kawai, Takafumi Aoki, Masakazu Fujio, Yosuke Kaga, Kenta Takahashi
{"title":"HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition","authors":"Koichi Ito,&nbsp;Yusei Suzuki,&nbsp;Hiroya Kawai,&nbsp;Takafumi Aoki,&nbsp;Masakazu Fujio,&nbsp;Yosuke Kaga,&nbsp;Kenta Takahashi","doi":"10.1049/bme2.12058","DOIUrl":"10.1049/bme2.12058","url":null,"abstract":"<p>Extracting a palm region with fixed location from an input hand image is a crucial task for palmprint recognition to realise reliable person authentication under contactless and unconstrained conditions. A palm region can be extracted from the fixed location using the gaps between fingers. An accurate and robust hand segmentation method is indispensable to extract a palm region from an image with complex background taken under various environments. In this study, HandSegNet, which is a hand segmentation method using Convolutional Neural Network (CNN) for contactless palmprint recognition, is proposed. HandSegNet employs a new CNN architecture consisting of an encoder–decoder model with a pyramid pooling module. Through performance evaluation using a set of synthesised hand images, HandSegNet exhibited the best segmentation results of 98.90% and 93.20% for accuracy and intersection over union, respectively. The effectiveness of HandSegNet in contactless palmprint recognition through experiments using a set of synthesised images of hand images is also demonstrated. Comparing the performance of palmprint recognition using three conventional methods and HandSegNet for palm region extraction, the proposed method has the lowest equal error rate of 4.995%, demonstrating its effectiveness in palm region extraction for contactless palmprint recognition.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"109-123"},"PeriodicalIF":2.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91114489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A biometric-based verification system for handwritten image-based signatures using audio to image matching 一种基于生物特征的验证系统,用于使用音频到图像匹配的手写图像签名
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-11-16 DOI: 10.1049/bme2.12059
Abdulaziz Almehmadi
{"title":"A biometric-based verification system for handwritten image-based signatures using audio to image matching","authors":"Abdulaziz Almehmadi","doi":"10.1049/bme2.12059","DOIUrl":"10.1049/bme2.12059","url":null,"abstract":"<p>Signing a document or a cheque by hand or using a stored image-based signature is known to be a valid method for authentication and authorisation by the signer. However, signature forging has advanced to replicate exactly how a signature looks, which can be done by skilfully, unskilfully or randomly forging a signature. Such a dilemma presents a challenge to accurately authenticate and authorise using signatures. In this study, a verification system is proposed for handwritten image-based signatures for validating whether the image-based signature is authentic rather than forged. The system maps the live stream of an audio-based signature with the investigated image-based signature and returns the match results. Matching is done by classification and/or by correlation between the two signatures. If matching shows a similar class or a score above a pre-defined threshold, the image-based signature is verified to be authentic, otherwise it is flagged as forged. A total of 20 participated in the experiment, where each participant provided a legitimate signature and forged four other signatures in different settings. In a double-blind setting, the system reported 95% accuracy using a one-class SVM and 100% accuracy using a correlation coefficient for detecting forged versus legitimate signatures.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"124-140"},"PeriodicalIF":2.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90829446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A response to the European Data Protection Supervisor ‘Misunderstandings in Biometrics’ by the European Association for Biometrics 欧洲生物识别协会对欧洲数据保护监管机构“生物识别技术中的误解”的回应
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-11-11 DOI: 10.1049/bme2.12057
Christoph Busch, Adam Czajka, Farzin Deravi, Pawel Drozdowski, Marta Gomez-Barrero, Georg Hasse, Olaf Henniger, Els Kindt, Jascha Kolberg, Alexander Nouak, Kiran Raja, Raghavendra Ramachandra, Christian Rathgeb, Jean Salomon, Raymond Veldhuis
{"title":"A response to the European Data Protection Supervisor ‘Misunderstandings in Biometrics’ by the European Association for Biometrics","authors":"Christoph Busch,&nbsp;Adam Czajka,&nbsp;Farzin Deravi,&nbsp;Pawel Drozdowski,&nbsp;Marta Gomez-Barrero,&nbsp;Georg Hasse,&nbsp;Olaf Henniger,&nbsp;Els Kindt,&nbsp;Jascha Kolberg,&nbsp;Alexander Nouak,&nbsp;Kiran Raja,&nbsp;Raghavendra Ramachandra,&nbsp;Christian Rathgeb,&nbsp;Jean Salomon,&nbsp;Raymond Veldhuis","doi":"10.1049/bme2.12057","DOIUrl":"10.1049/bme2.12057","url":null,"abstract":"<p>The intention of this position paper is to comment on the joint European Data Protection Supervisor (EDPS)-Agencia Española de Protección de Datos (aepd) publication ‘14 Misunderstandings with regard to Biometric Identification and Authentication’ that was published in June 2020 and to provide additional input to help with the better understanding of the issues raised in that publication. In particular, it aims to highlight some important missing information in the aforementioned publication. It is hoped that this paper will help with any future revision of the EDPS-aepd publication, such that it includes a full picture of the current state of the art in biometrics and the availability of standards and privacy enhancing techniques.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 1","pages":"79-86"},"PeriodicalIF":2.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73818655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securable networked scheme with face authentication 具有人脸认证的安全网络方案
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-09-09 DOI: 10.1049/bme2.12056
Da-You Huang, Chun-Liang Lin, Yang-Yi Chen
{"title":"Securable networked scheme with face authentication","authors":"Da-You Huang,&nbsp;Chun-Liang Lin,&nbsp;Yang-Yi Chen","doi":"10.1049/bme2.12056","DOIUrl":"10.1049/bme2.12056","url":null,"abstract":"<p>Recently, facial recognition has been extensively adopted in various fields. Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. The IoT configuration proposed includes a perception layer, a transmission layer, and an application layer to fulfil a complete IoT system. In the perception layer, the facial authentication mechanism is adopted. This system is equipped with a highly robust anti-spoofing function, which can avoid criminal access from photos or electronic screens. Finally, the IoT transmission system is realised as the transmission layer. Combined with such a transmission mechanism, one can distribute user facial features to user's electronic devices instead of storing it in the server. This not only saves storage resources and transmission costs, but also allows users to complete data transmission and face authentication easily.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"97-108"},"PeriodicalIF":2.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76633220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication 客座编辑:BIOSIG 2020个人认证可信度特刊
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-09-02 DOI: 10.1049/bme2.12055
Ana F. Sequeira, Marta Gomez-Barrero, Paulo Lobato Correia
{"title":"Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication","authors":"Ana F. Sequeira,&nbsp;Marta Gomez-Barrero,&nbsp;Paulo Lobato Correia","doi":"10.1049/bme2.12055","DOIUrl":"https://doi.org/10.1049/bme2.12055","url":null,"abstract":"&lt;p&gt;Recent guidelines for ‘Trustworthy AI’ state that it not only relates the trustworthiness of the AI system itself but also comprises the trustworthiness of all processes and actors that are part of the system's life cycle. Person authentication is a particular application of AI in which (i) the compliance to laws and regulations; (ii) the respect for ethical principal and values; (iii) and the robustness, both from a technical and social perspective, are of crucial importance.&lt;/p&gt;&lt;p&gt;This is the first IET Biometrics ‘Trustworthiness of Person Authentication’ special issue, having as starting point the 2020 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the trustworthiness of the involved processes.&lt;/p&gt;&lt;p&gt;The ‘BIOSIG 2020 special issue on Trustworthiness of Person’ issue contains seven papers, most of them being extended versions of papers presented at the BIOSIG 2020 conference, dealing with concrete research areas within biometrics such as presentation attack detection (PAD), traditional and emergent biometric characteristics, and biometric recognition and soft biometrics in the presence of facial masks.&lt;/p&gt;&lt;p&gt;The paper ‘Unknown Presentation Attack Detection against Rational Attackers’, by Ali Khodabakhsh and Zahid Akhtar, investigates the vulnerability of PAD systems to attacks in real-life settings, addressing the detection of unknown attacks, the performance in adversarial settings, few-shot learning, and explainability. In this study, these limitations are addressed through an approach that relies on a game theoretic view for modelling the interactions between the attacker and the detector. These challenges are successfully addressed, and the methodology proposed provides a more balanced performance across known and unknown attacks, achieving at the same time state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach is studied as well as its ability to provide pixel-level explainability.&lt;/p&gt;&lt;p&gt;The paper ‘On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection’ by Lazaro Gonzalez-Soler, Marta Gomez-Barrero and Christoph Busch, focusses on face PAD in more challenging scenarios, where unknown attacks are included in the test set. Considering those more realistic scenarios, in which the existing algorithms face difficulties in detecting unknown presentation attack instruments (PAI), the authors propose a new feature space based on Fisher vectors, computed from compact binarised statistical image features' (BSIF) histograms, which allow discovering semantic feature subsets from known samples in order to enhance the detection of unknown attacks. This new representation, evaluated for challenging unknown attacks taken from freely available facial databases, shows promi","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"457-459"},"PeriodicalIF":2.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72126370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication 嘉宾评论:2020年BIOSIG关于个人认证可信度的特刊
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-09-01 DOI: 10.1049/bme2.12055
Ana F. Sequeira, M. Gomez-Barrero, Paulo Lobato Correia
{"title":"Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication","authors":"Ana F. Sequeira, M. Gomez-Barrero, Paulo Lobato Correia","doi":"10.1049/bme2.12055","DOIUrl":"https://doi.org/10.1049/bme2.12055","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"41 1","pages":"457-459"},"PeriodicalIF":2.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76649373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EEG personal recognition based on ‘qualified majority’ over signal patches 基于“限定多数”的脑电信号个人识别
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-08-19 DOI: 10.1049/bme2.12050
Andrea Panzino, Giulia Orrù, Gian Luca Marcialis, Fabio Roli
{"title":"EEG personal recognition based on ‘qualified majority’ over signal patches","authors":"Andrea Panzino,&nbsp;Giulia Orrù,&nbsp;Gian Luca Marcialis,&nbsp;Fabio Roli","doi":"10.1049/bme2.12050","DOIUrl":"10.1049/bme2.12050","url":null,"abstract":"<p>Electroencephalography (EEG)-based personal recognition in realistic contexts is still a matter of research, with the following issues to be clarified: (1) the duration of the signal length, called ‘epoch’, which must be very short for practical purposes and (2) the contribution of EEG sub-bands. These two aspects are connected because the shorter the epoch’s duration, the lower the contribution of the low-frequency sub-bands while enhancing the high-frequency sub-bands. However, it is well known that the former characterises the inner brain activity in resting or unconscious states. These sub-bands could be of no use in the wild, where the subject is conscious and not in the condition to put himself in a resting-state-like condition. Furthermore, the latter may concur much better in the process, characterising normal subject activity when awake. This study aims at clarifying the problems mentioned above by proposing a novel personal recognition architecture based on extremely short signal fragments called ‘patches’, subdividing each epoch. Patches are individually classified. A ‘qualified majority’ of classified patches allows taking the final decision. It is shown by experiments that this approach (1) can be adopted for practical purposes and (2) clarifies the sub-bands’ role in contexts still implemented in vitro but very similar to that conceivable in the wild.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 1","pages":"63-78"},"PeriodicalIF":2.0,"publicationDate":"2021-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84293337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Unknown presentation attack detection against rational attackers 针对理性攻击者的未知演示攻击检测
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-08-06 DOI: 10.1049/bme2.12053
Ali Khodabakhsh, Zahid Akhtar
{"title":"Unknown presentation attack detection against rational attackers","authors":"Ali Khodabakhsh,&nbsp;Zahid Akhtar","doi":"10.1049/bme2.12053","DOIUrl":"https://doi.org/10.1049/bme2.12053","url":null,"abstract":"<p>Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real-life settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial settings, few-shot learning, and explainability. In this study, these limitations are approached by reliance on a game-theoretic view for modelling the interactions between the attacker and the detector. Consequently, a new optimisation criterion is proposed and a set of requirements are defined for improving the performance of these systems in real-life settings. Furthermore, a novel detection technique is proposed using generator-based feature sets that are not biased towards any specific attack species. To further optimise the performance on known attacks, a new loss function coined categorical margin maximisation loss (C-marmax) is proposed, which gradually improves the performance against the most powerful attack. The proposed approach provides a more balanced performance across known and unknown attacks and achieves state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach as well as its ability to provide pixel-level explainability is studied.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"460-479"},"PeriodicalIF":2.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72141048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信